CybersecurityApril 10, 20269 min read

Adobe Reader Zero-Day Exploited via Malicious PDFs: What Security Teams Must Do Now

SI

Secured Intel Team

Editor at Secured Intel

 Adobe Reader Zero-Day Exploited via Malicious PDFs: What Security Teams Must Do Now

In December 2025, threat researchers confirmed that attackers had been silently exploiting an unpatched vulnerability in Adobe Reader and Acrobat — no clicks required, no warning dialogs, no user error to blame. A specially crafted PDF lands in an inbox, the recipient opens it, and the exploit runs. As of disclosure, it worked on the latest builds. If your enterprise trusts PDFs — and nearly every enterprise does — this is an active problem on your attack surface right now.

This post breaks down exactly how the exploit works, what the attacker gains, how to detect it, and what defensive steps you can realistically implement before a patch arrives. No filler. No marketing language.


How the Adobe Reader Zero-Day Actually Works

The JavaScript Execution Problem

Adobe Reader supports embedded JavaScript — a feature designed to enable interactive forms and dynamic document behavior. The exploit weaponizes this by embedding heavily obfuscated JavaScript that executes automatically on document open, mapped to MITRE ATT&CK technique T1059.007 (JavaScript execution via client-side interpreter).

Critically, the attacker's script doesn't simply run in a sandboxed scripting environment. The vulnerability allows the script to call privileged Acrobat APIs that are supposed to be inaccessible to untrusted document content. Think of it as a JavaScript payload that picks a locked door — the door was supposed to stay locked, but the lock is broken.

What the Script Collects

Once those privileged APIs are accessible, the script can query the Reader context for:

  • Active username and system hostname
  • Operating system version and architecture
  • Installed application list
  • Network interface configuration

This maps directly to T1005 (local data collection) and provides an attacker with exactly the reconnaissance data needed to profile a target before deploying follow-on payloads. Researchers have described the exploit as a first-stage loader, meaning data exfiltration is not the endgame — it's the entry survey before RCE and sandbox escape.


Exploit Delivery: Targeted, Not Spray-and-Pray

This is not commodity phishing. Campaign characteristics align with T1566.001 (spear-phishing with attachment). The lure PDFs are tailored, likely referencing documents relevant to the specific target — invoices, contracts, regulatory filings, HR materials.

Why Targeted Delivery Matters for Detection

Defenders often calibrate email gateway rules around volume. Targeted spear-phishing campaigns deliberately stay below the noise threshold. A single malicious PDF sent to one employee in your finance team will not trigger a volumetric alert. It will look like a normal business communication.

Important: If your email security relies primarily on spam scoring and sender reputation, you may be blind to this campaign. PDF file inspection — including static analysis of embedded JavaScript streams — needs to be in your pipeline, not just attachment sandboxing.

Sophos published a forensic breakdown of the exploit's structure and JavaScript logic, which is directly useful for writing detection rules against the obfuscation patterns in the embedded scripts.


Detection Engineering: What to Look For

The table below maps each attack stage to detection opportunities. Not all stages are equally visible — defenders tend to see stage 1 or stage 5, but rarely stages 2–4 without dedicated tooling.

Attack StageMITRE TechniqueDetection OpportunityTooling
Spear-phishing deliveryT1566.001Email gateway, attachment inspectionSEG, CAS
PDF opened, JS executesT1059.007PDF sandbox detonation, Reader process spawning child processesSandbox, EDR
Privileged API callsT1203Reader making unusual API calls, process behavior anomalyEDR telemetry
Data exfil from ReaderT1005Network connection from AcroRd32.exe, DNS queries to unknown hostsNDR, FW logs
RCE / sandbox escapeT1055Unexpected process injection, Reader spawning shell processesEDR, SIEM

Your richest detection signal will come from endpoint telemetry (EDR). Look specifically for:

  • AcroRd32.exe or Acrobat.exe spawning cmd.exe, powershell.exe, or wscript.exe
  • Network connections initiated by Reader to non-Adobe infrastructure
  • Reader processes attempting to read from directories outside %USERPROFILE%\Documents

Recommended Mitigations Before a Patch Ships

Adobe has not released a patch as of disclosure. That means defenders are operating in the gap, and mitigation requires active configuration choices — not passive waiting.

Disable JavaScript in Adobe Reader

Adobe Reader allows JavaScript to be disabled via the application preferences (Edit → Preferences → JavaScript → uncheck "Enable Acrobat JavaScript"). For enterprise environments, this setting can be enforced via Group Policy or the Adobe Customization Wizard. This is the single most effective immediate control.

Pro Tip: JavaScript in PDFs serves legitimate purposes in some workflows (interactive forms, calculation fields). Before pushing a blanket disable via GPO, audit which internal PDF workflows genuinely require it. In most organizations, the answer is fewer than you expect.

Enforce PDF Sandboxing

Reader includes a Protected Mode (sandboxing) that runs rendering in a low-privilege process. Verify this is enabled and not disabled by legacy application compatibility policies. Many enterprises quietly disabled Protected Mode years ago to fix a software conflict and never re-enabled it.

Deploy PDF Detonation in Your Email Gateway

Static scanning of PDF attachments is insufficient against obfuscated JavaScript. Dynamic analysis (sandbox detonation) forces the PDF to execute in an instrumented environment where behavioral indicators — API calls, network connections, child process spawning — are observable before delivery.

MitigationRisk ReductionComplexityCost
Disable PDF JavaScript (GPO)HighLowNone
Enable Reader Protected ModeMediumLowNone
PDF sandbox detonation at email gatewayHighMediumVendor dependent
Network monitoring for Reader processesMediumMediumEDR/NDR tooling
Patch (when available)DefinitiveLowStandard patch cycle

Framework Alignment

This incident maps to several controls across security frameworks:

  • NIST CSF 2.0: DE.CM-1 (network monitoring), PR.PS-1 (configuration management)
  • CIS Controls v8: Control 7 (email/web browser protections), Control 8 (malware defenses), Control 13 (network monitoring)
  • ISO 27001:2022: A.8.7 (protection against malware), A.8.22 (filtering of web services)

For organizations under PCI DSS or HIPAA, this vulnerability is particularly relevant — both frameworks require prompt patching of known vulnerabilities and compensating controls when patches are unavailable.


Incident Response: If You Suspect Exposure

If a user reported opening a PDF that behaved unexpectedly — Reader crashed, an unusual dialog appeared, or their system became slow after opening a document — treat it as a potential compromise.

Immediate steps:

  • Isolate the endpoint from the network
  • Preserve a forensic image before remediation
  • Pull EDR telemetry for the affected host, focusing on Reader process activity in the window around the suspicious open
  • Search your email gateway logs for the sender and any other recipients of the same attachment
  • Query your NDR/firewall logs for outbound connections from Reader processes across the fleet

Consider the event a potential multi-stage intrusion, not merely a malware infection. If the exploit completed successfully, the attacker may have already delivered a second-stage payload. Containment scope should reflect that possibility.


Key Takeaways

  • Disable JavaScript in Adobe Reader immediately using GPO or Acrobat's preferences, and document any workflows that require it as exceptions.
  • Verify Protected Mode is active across your fleet — this may already be misconfigured.
  • Enable behavioral PDF inspection at the email gateway; static file scanning will not catch this exploit.
  • Hunt for AcroRd32.exe anomalies in existing EDR telemetry — lateral movement may have already occurred in targeted environments.
  • Treat any suspicious PDF-opening event as a potential first-stage intrusion, not just malware execution.
  • Monitor Sophos threat intelligence and Adobe's security advisory feed for the official patch and any IOC updates as the campaign evolves.

Conclusion

Zero-days exploiting ubiquitous enterprise software — particularly file formats like PDF that carry implicit trust — are among the hardest threats to defend against. The Adobe Reader vulnerability active since December 2025 is notable not just for the absence of a patch, but for the exploit's architecture: it collects, it profiles, and it chains. An organization that detects only the final RCE stage has missed the opportunity to interrupt the attack earlier.

The practical next step is not waiting for Adobe. It's auditing your PDF JavaScript policy, verifying Protected Mode is enforced, and reviewing your email gateway's PDF handling capabilities this week. Document your current state against the CIS Controls and NIST CSF mappings above. That audit will surface the gaps before an attacker does.


Frequently Asked Questions

Do I need to click anything inside the PDF for the exploit to run? No. The JavaScript executes automatically when the document is opened in a vulnerable version of Adobe Reader or Acrobat. There is no secondary interaction required, which is what makes this particularly dangerous in environments where users routinely open attachments.

Does this affect Adobe Reader on macOS and Linux, or only Windows? Confirmed samples work on the latest Adobe Reader builds across platforms at time of disclosure. You should treat all operating systems as potentially affected until Adobe's security advisory specifies otherwise.

Will disabling JavaScript break our existing PDF workflows? It depends on your environment. Standard read-only PDFs, contracts, and reports are unaffected. PDFs with interactive form calculations, dynamic field population, or submit buttons that use JavaScript will lose that functionality. Audit before deploying broadly.

We use a third-party PDF reader, not Adobe. Are we affected? This vulnerability is specific to Adobe Reader and Acrobat's JavaScript engine and the privileged API layer it exposes. Third-party readers (Foxit, PDF-XChange, browser-native renderers like Chrome's PDFium) are not affected by this specific vulnerability. However, PDFs that attempt exploitation will simply fail silently in those readers — they will not generate an alert.

How do we know if we've already been compromised? Hunt in your EDR telemetry for AcroRd32.exe or Acrobat.exe spawning child processes (especially command shells), initiating outbound network connections to non-Adobe infrastructure, or reading from unusual file paths. Cross-reference against email gateway logs for PDFs received from external senders around the December 2025 timeframe onward. Absence of evidence is not evidence of absence — if your EDR retention is short, consider this a gap.

Secured Intel

Enjoyed this article?

Subscribe for more cybersecurity insights.

Subscribe Free